HolyBugx
511 posts


@rez0__ Lots of contradiction & speculation with little data.
- "Hackbots find 1 % of vulns" → How was this measured?
- 2 → 3 → 4 % isn't a law; one jump ≠ trend.
- "Hackbot singularity this year" clashes with your "slow hand-off"
Where are the citations? Evidence or just vibes?
English
HolyBugx 리트윗함

The results are in! We're proud to announce the Top ten web hacking techniques of 2024! portswigger.net/research/top-1…
English

My English has never been good, I tried to translate what I had in my mind and I hope this shows how I feel
Every step of this journey was a challenge—long hours, sacrifices, and moments when it felt impossible. But it was all worth it. I’m so proud and honored to have won 1st place at the Pwn2Own 2025 competition!
To the amazing @thezdi team: your hard work, care, and passion made this event possible. You didn’t just host a competition—you gave me a chance to dream bigger, work harder, and achieve something great. Thank you for every second of your work and effort!
And to God: thank You for being my strength, my guide, and my reason to keep going through the toughest moments. I am forever grateful. 💙🙏

TrendAI Zero Day Initiative@thezdi
And that’s a wrap! #Pwn2Own Automotive 2025 is complete. In total, we awarded $886,250 for 49 0-days over the three day competition. With 30.5 points and $222,250 awarded, Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) is our Master of Pwn. #P2OAuto
English
HolyBugx 리트윗함

New blog post with @infosec_au:
We found a vulnerability in Subaru where an attacker, with just a license plate, could retrieve the full location history, unlock, and start vehicles remotely.
The issue was reported and patched.
Full post here: samcurry.net/hacking-subaru
English
HolyBugx 리트윗함

Introducing the Cookie Sandwich, a tasty technique to steal HttpOnly cookies using legacy RFC features: portswigger.net/research/steal…
English
HolyBugx 리트윗함
HolyBugx 리트윗함
HolyBugx 리트윗함

Did you know you can use an ancient magic cookie to downgrade parsers and bypass WAFs?! Neither did we. Enjoy!
portswigger.net/research/bypas…
English
HolyBugx 리트윗함

Check out our latest blog post! We dive into GitHub Enterprise’s SAML implementation and explore an authentication bypass in encrypted assertion mode.
CVE-2024-4985 / CVE-2024-9487: GitHub Enterprise SAML Authentication Bypass.
projectdiscovery.io/blog/github-en…
English
HolyBugx 리트윗함

1 Bug, $50K+ in bounties: how Zendesk left a backdoor in hundreds of companies #bugbountytips
gist.github.com/hackermondev/6…
English

Attacking UNIX Systems via CUPS, Part I
evilsocket.net/2024/09/26/Att…
English
HolyBugx 리트윗함

Love a good client-side exploit chain! This crazy cross-product chain targeting Google by @rebane2001 is a great example of the type of exploit that gets easier the longer you spend targeting a single company
lyra.horse/blog/2024/09/u…
English
HolyBugx 리트윗함

In August, watchTowr Labs hijacked parts of the global .mobi TLD - and went on to discover the mayhem that we could cause.
Enjoy....
labs.watchtowr.com/we-spent-20-to…
English
HolyBugx 리트윗함

In April, @samwcyo and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found.
Here is our writeup:
ian.sh/tsa
English
HolyBugx 리트윗함

Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues! blog.orange.tw/2024/08/confus…
Highlights include:
⚡ Escaping from DocumentRoot to System Root
⚡ Bypassing built-in ACL/Auth with just a '?'
⚡ Turning XSS into RCE with legacy code from 1996
English
HolyBugx 리트윗함

Everyone knows that the RFCs for email addresses are crazy. This post will show without doubt that you should not be following the RFC.
portswigger.net/research/split…
English
HolyBugx 리트윗함

The whitepaper is live! Listen to the whispers: web timing attacks that actually work. Read it here ->
portswigger.net/research/liste…
English
HolyBugx 리트윗함

I recently developed and posted about a technique called "First sequence sync", expanding @albinowax's single packet attack.
This technique allowed me to send 10,000 requests in 166ms, which breaks the packet size limitation of the single packet attack.
flatt.tech/research/posts…
English






